67
St.JOSEPH’S COLLEGE OF ENGINEERING, CHENNAI-119 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS2304 SYSTEM SOFTWARE Semester: V UNIT-1 Part A 1. Define System Software. System software is the program that support the operation of a computer E.g. Assembler, Compiler, etc. 2. Distinguish between System Software & application software. Application software System software Application program is primarily concerned with the solution of some problem using computer System programs are intended to support the operation and use of the computer rather than any particular application Not related to machine architecture Related to the architecture of the machine on which they are to run Not machine dependent Most system software’s are machine dependent 3. Define hypothetical computer model. SIC – Simplified Instructional Computer – is the hypothetical computer that has been designed to include the hardware features most found on real machines 4. What are the SIC two versions? 1. SIC-standard version. 2. SIC/XE (XE – Extra equipment or extra expensive. 5. Give the instructions format of SIC. All machine instructions on the standard version of SIC have the following 24-bit format: Opcod e x Addres s The flag bit x is used to indicate indexed- addressing mode 6. Give the instructions set of SIC. Load and store instructions (LDA, LDX, STA, STX)

System Software Question Bank 2012 With Part-B Answers

Embed Size (px)

Citation preview

Page 1: System Software Question Bank 2012 With Part-B Answers

St.JOSEPH’S COLLEGE OF ENGINEERING, CHENNAI-119

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CS2304 SYSTEM SOFTWARE Semester: V

UNIT-1Part A

1. Define System Software.System software is the program that support the operation of a computer

E.g. Assembler, Compiler, etc.2. Distinguish between System Software & application software.

Application software System softwareApplication program is primarily concerned with the solution of some problem using computer

System programs are intended to support the operation and use of the computer rather than any particular application

Not related to machine architecture Related to the architecture of the machine on which they are to run

Not machine dependent Most system software’s are machine dependent

3. Define hypothetical computer model.SIC – Simplified Instructional Computer – is the hypothetical computer that has been designed to include the hardware features most found on real machines

4. What are the SIC two versions?1. SIC-standard version.2. SIC/XE (XE – Extra equipment or extra expensive.

5. Give the instructions format of SIC.All machine instructions on the standard version of SIC have the following 24-bit format:

Opcode x AddressThe flag bit x is used to indicate indexed-addressing mode

6. Give the instructions set of SIC.Load and store instructions (LDA, LDX, STA, STX)

Integer arithmetic operations (ADD, SUB, MUL, DIV) Comparison operation (COMP) Conditional Jump operations (JLT, JEQ, JGT) Jump to Subroutine instruction (JSUB) Return to Subroutine (RSUB)

7. Most system software is machine dependent. Justify.System programs are to support the operation and use of the target computer. The Machine code, Instruction formats, Addressing mode and Registers are different for different machines. Therefore, most of the system softwares are machine dependant.

8. What are the addressing modes in SIC?There are two types of addressing available in SIC:

MODE INDICATION Target Address (TA) calculation a) Direct addressing x=0 TA=address b) Indexed addressing x=1 TA=address+(x)

Page 2: System Software Question Bank 2012 With Part-B Answers

9. What are the registers used in SIC?There are 5 registers in SIC machine.Each register is 24 bits in length

Mnemonicor register- name

Number Special use

A 0 Accumulator - used for arithmetic operationsX 1 Index register – used for addressingL 2 Linkage register – JSUB (Jump to subroutine)

instruction stores the return address in this registerPC 8 Program Counter – contains the address of the next

instruction to be fetched for executionSW 9 Status word – contains a variety of information,

including a Condition Code (CC)10. Illustrate how input and out operations are performed in SIC.

Performed by transferring one byte at a time to or from the rightmost 8-bits of register A

three I/O (input/output) instructions – each of which specifies the device code as an operand

- TD (Test Device) instruction tests whether the addressed device is ready to send or receive a byte of data.

- RD (Read Data)- WD (Write Data)

11. Give the Instructions format of SIC/XE.There are four different instruction formats:1.Format 1: 8

OPCODE

2.Format 2: 8 4 4

3.Format 3: 6 1 1 1 1 1 1 12

4.Format 4: 6 1 1 1 1 1 1 20

n-indirect i-immediate x-indexed

b-base p-program counter e-extended

OP R1 R2

OPN i x b p e Disp

OP n i x b p e Disp

Page 3: System Software Question Bank 2012 With Part-B Answers

12. Give the Instructions set of SIC/XE. new registers: LDB, STB, etc. floating-point arithmetic: ADDF, SUBF, MULF, DIVF register move: RMO register-register arithmetic: ADDR, SUBR, MULR, DIVR supervisor call: SVC generates an interrupt for OS Give the Data

format of SIC/XE.Floating-point data type: frac*2(exp-1024)frac: 0~1exp: 0~2047

13. What are the addressing modes in SIC/XE?MODE INDICATION TA

CALCULATION a) Base relative b=1,p=0 TA=(B)+disp

Displacement value can range from 0 to 4095 (Only +ve values)

b) Program-counter relative b=0,p=1 TA=(PC)+disp

Displacement can vary from -2048 to 204714. Illustrate how input and out operations are performed in SIC/XE.

SIO, TIO, HIO: start, test, halt the operation of I/O device.15. What are the registers used in SIC/XE?

Registers:Mnemonic Number Special useB 3 Base register for addressingS 4 General working registerT 5 General working registerF 6 Floating point accumulator

16. What are the four assembler directives used in the SIC assembler language?WORD BYTE RESW RESB

17. Give any two differences between base relative addressing and program counter relative addressing used in SIC/XE.

exponent (11) fraction (36)s

Page 4: System Software Question Bank 2012 With Part-B Answers

18. What is the difference between the instructions LDA # 3 and LDA THREE?In the first instruction immediate addressing is used. Here the value 3 is

directly loaded into the accumulator register where as in the second instruction the direct addressing is used. Here value assigned for the symbol THREE is loaded into the accumulator register.19. Consider the instructions in SIC/ XE programming

10 1000 LENGTH RESW 420 ----- NEW WORD 3

21. What is the value assign to the symbol NEWIn the line 10 the address is 1000 and the instruction is RESW 4.It

reserves 4 word (3x 4 =12) area for the symbol LENGTH. Hence 12 is added to the LOCCTR. Thus the value of the symbol NEW is 1000+12 =100C.22. Write down the use of the status word (SW) register. (May ’11)

Status word – contains Condition Code (CC) information.23. Define program counter relative mode of addressing. (May’11)

In Program-counter mode of addressing, the target address is calculated by adding displacement and the content of program counter.

---------------------------------------------------------------------------------------------------------------------

PART-B1. Explain in detail about the SIC machine architecture. (May’11)

The Simplified Instructional Computer (SIC) i) MemoryMemory consists of 8-bit bytesAny 3 consecutive bytes form a word (24 bits)Total of 32768 (215) bytes in the computer memoryii) RegistersFive 24-bits registers

iii) Data Formats Integers are stored as 24-bit binary number 2’s complement representation for negative values

Characters are stored using 8-bit ASCII codes

No floating-point hardware on the standard version of SICiv) Instruction FormatsStandard version of SIC

Page 5: System Software Question Bank 2012 With Part-B Answers

8 1 15

opcode x address

Mode Indication Target address calculation

Direct x=0 TA=address

Indexed x=1 TA=address+(X)

(X): the contents of register Xv) Instruction Set

Load and store registers LDA, LDX, STA, STX, etc.

Integer arithmetic operations

ADD, SUB, MUL, DIV

All arithmetic operations involve register A and a word in memory, with the result being left in A

COMP

Conditional jump instructions

JLT, JEQ, JGT

Subroutine linkage

JSUB, RSUB

I/O (transferring 1 byte at a time to/from the rightmost 8 bits of register A)

Test Device instruction (TD)

Read Data (RD)

Write Data (WD)---------------------------------------------------------------------------------------------------------------------

2. Explain SIC assembler language programming with suitable example. (May’11)

Page 6: System Software Question Bank 2012 With Part-B Answers

Program for SIC machine to move a word and character to different locations

Program for SIC machine to copy 11 byte string from one location to another.

Program for SIC machine to add two arrays each with 100 numbers:GAMMA[I]=ALPHA[I]+BETA[I]

---------------------------------------------------------------------------------------------------------------------

LDX ZERO initialize index register to 0

MOVECH LDCH STR1,X load char from STR1 to reg ASTCH STR2,XTIX ELEVEN add 1 to index, compare to 11JLT MOVECH loop if “less than”...

STR1 BYTE C’TEST STRING’STR2 RESB 11ZERO WORD 0ELEVEN WORD 11

Page 7: System Software Question Bank 2012 With Part-B Answers

3. Explain with examples a) I/O operations b) Data Movement operations for

SIC and SIC/XE. (16)

a) i) I/O operations for SIC TD INDEV test input deviceJEQ INLOOP loop until device is readyRD INDEV read one byte into register ASTCH DATA..

OUTLP TD OUTDEV test output deviceJEQ OUTLP loop until device is readyLDCH DATAWD OUTDEV write one byte to output device..

INDEV BYTE X’F1’ input device numberOUTDEV BYTE X’05’ output device numberDATA RESB 1

ii) I/O operations for SIC/XE

b) i) Data movement operations or SIC LDA FIVESTA ALPHALDCHCHARZSTCH C1

Page 8: System Software Question Bank 2012 With Part-B Answers

.

.

.ALPHA RESW1 one-word variableFIVE WORD 5 one-word constantCHARZ BYTE C’Z’ one-byte constantC1 RESB 1 one-byte variableii) Data movement operations or SIC/XE

LDA #5 STA ALPHA

LDCH #90STCH C1..

ALPHA RESW 1C1 RESB 1

---------------------------------------------------------------------------------------------------------------------

4. Explain the architecture of SIC/XE machine.SIC/ XE version (upward compatible)

1) Memory - Maximum 1 megabyte (220 bytes)2) Registers - Additional registers are provided by SIC/XE

3) Support 48-bit floating-point data type4) Instruction formats

Page 9: System Software Question Bank 2012 With Part-B Answers

Addressing modes Base relative (n=1, i=1, b=1, p=0) Program-counter relative (n=1, i=1, b=0, p=1) Direct (n=1, i=1, b=0, p=0) Immediate (n=0, i=1, x=0) Indirect (n=1, i=0, x=0) Indexing (both n & i = 0 or 1, x=1) Extended (e=1 for format 4, e=0 for format 3)

Base Relative Addressing Mode

n i x b p e

opcode 1 1 0 1 0 0 disp

n=1, i=1, b=1, p=0, TA=(B)+disp (0disp 4095)

Program-Counter Relative Addressing Mode

n i x b p e

opcode 1 1 0 1 disp

n=1, i=1, b=0, p=1, TA=(PC)+disp (-2048disp 2047)

Direct Addressing Mode

n i x b p e

opcode 1 1 0 0 disp

n=1, i=1, b=0, p=0, TA=disp (0disp 4095)

n i x b p e

opcode 1 1 1 0 0 disp

Page 10: System Software Question Bank 2012 With Part-B Answers

4) Instruction Set Instructions to load and store the new registers

LDB, STB, etc. Floating-point arithmetic operations

ADDF, SUBF, MULF, DIVF Register move instruction

RMO Register-to-register arithmetic operations

ADDR, SUBR, MULR, DIVR Supervisor call instruction

SVC5) Input and Output

There are I/O channels that can be used to perform input and output while the CPU is executing other instructions---------------------------------------------------------------------------------------------------------------------

n=1, i=1, b=0, p=0, TA=(X)+disp (with index addressing mode)

Immediate Addressing Mode

n i x b p e

opcode 0 1 0 disp

n=0, i=1, x=0, operand=disp

Indirect Addressing Mode

n i x b p e

opcode 1 0 0 disp

n=1, i=0, x=0, TA=(disp)

Simple Addressing Mode

n i x b p e

opcode 0 0 disp

i=0, n=0, TA=bpe+disp (SIC standard)

n i x b p e

opcode 1 1 disp

i=1, n=1, TA=disp (SIC/XE standard)

Page 11: System Software Question Bank 2012 With Part-B Answers

5. Mention the differences between SIC and SIC/XE.S.No. SIC SIC/XE1. Memory - Total of 32768 (215)

bytes in the computer memoryMaximum 1 megabyte (220 bytes)

2 Registers There are five registers,

each 24bit length. They are A,L,X,PC,SW.

Additional registers – B, S, T, F

3. Data Formats Integers are stored as

24 bit binary numbers. 2’s complement

negative values Characters stored using

8bit ASCII code. No floating point h/w.

Integers are stored as 24 bit binary numbers.

2’s complement negative values Characters stored using 8bit ASCII

code. Support 48-bit floating-point data type

4. Instruction Formats All m/c instruction are

24 bit length.Format:

5. Addressing Modes – direct (x=0) and indexed addressing

Base relative (n=1, i=1, b=1, p=0) Program-counter relative (n=1, i=1, b=0,

p=1) Direct (n=1, i=1, b=0, p=0) Immediate (n=0, i=1, x=0) Indirect (n=1, i=0, x=0) Indexing (both n & i = 0 or 1, x=1) Extended (e=1 for format 4, e=0 for format

3)

6. Instruction set Used to load

and store. Load instructions are

LDA, LDX. Store instructions are

STA, STX. Integer arithmetic

operations are ADD, SUB, MUL, DIV.

COMP compares value of register A with a word

Instructions to load and store the new registers

LDB, STB, etc. Floating-point arithmetic operations

ADDF, SUBF, MULF, DIVF Register move instruction

RMO Register-to-register arithmetic operations

ADDR, SUBR, MULR, DIVR Supervisor call instruction

SVC

Page 12: System Software Question Bank 2012 With Part-B Answers

in memory. Conditional jump

instructions are JLT, JEQ, and JGT.

Two instructions for subroutine linkages are JSUB, RSUB.

7. Input/output I/p and O/pare

performed by transferring one byte at a time to are from rightmost 8 bit of register A.

There are 3 I/O instructions. They are Test Device Read Data Write Data

There are I/O channels that can be used to perform input and output while the CPU is executing other instructions

6. Explain with examples a) Simple arithmetic operations b) Looping and indexing operations

for SICand SIC/XE.Simple Arithmetic Operation SIC & SIC/XE.

Page 13: System Software Question Bank 2012 With Part-B Answers

Looping and Indexing SIC & SIC/XE

7. Differentiate CISC & RISC.(8)

S.No. CISC RISC1. Complex Instruction Set Computer Reduced instruction Set Computer2 Has large and complicated

Instruction setInstruction set – relatively small

3. Most of the instructions refer memory

Only load and store access the memory

4. Supports many addressing modes Supports smaller no. of addressing modes5. Has microprogrammed control

unit Has Hardwired Control unit

6. More than one clock cycle / instruction are required for execution

One clock cycle / instruction is required for execution

7. Only one set of general purpose of registers

Large no. of general purpose registers

8. Explain Ultra sparc architectureULTRA SPARC Architecture - announced by sun systems1) Memory – consists of 8-bit bytes

- all address are byte addresses- 2 consecutive bytes called half word, 4

consecutive bytes called word, 8 consecutive bytes called double word

- Virtual address space of 264 bytes 2) Registers – large register file (>100 general purpose registers)

Page 14: System Software Question Bank 2012 With Part-B Answers

- any process can access 32 registers (r0 to r31), 32 bits long extended to 64 bits

- Floating-point unit contains a file of 64 double-precision FP registers and other control and status registers.

3) Data formats - Integer – 8, 16, 32, 64 bit binary numbers- Signed negative integer 2’s compliment form - big-endian byte ordering- 3 FP data formats 1) single precision 32-bits long, 2)double

precision 64-bits long and 3) quad precision format4) Addressing modes – PC-relative, register-indirect and register indirect

indexed5) Instruction set – less than 100 machine instructions

- load and store only refer memory and other instructions use registers, pipelined execution and delayed branches

6) I/O operation – Communication with I/O through memory- range of memory locations – logically replaced by device registers - no special I/O instructions

--------------------------------------------------------------------------------------------------------------------

9. Explain about the Cray T3E architecture

Page 15: System Software Question Bank 2012 With Part-B Answers

10. Write a sequence of instruction for SIC to set VAL 1 = VAL 2 + INCR-2 VAL 3 = VAL 4 + INCR-2

Illustrate how the same calculation could be performed of SIC/XE. SIC instructionsLDA                       VAL2ADD                       INCRSUB                        TWOSTA                        VAL1LDA                       VAL4ADD                       INCRSUB                        TWOSTA                        VAL3VAL2                      RESW    1INCR                      RESW 1TWO                      WORD 2 VAL 1                     RESW 1 VAL 4                     RESW 1 VAL 3                     RESW 1SIC/XE instruction                       

Page 16: System Software Question Bank 2012 With Part-B Answers

                        LDS                        INCR                        LDA                       VAL 2                                ADDR                    S, A                                SUB                        # 2                                STA                        VAL 1                                LDA                       VAL 4                                ADDR                    S, A                                SUB                        # 2                                STA                        VAL 3INCR                      RESW 1 VAL 2                     RESW 1VAL 1                     RESW 1VAL 4                     RESW 1VAL 3                     RESW 1

---------------------------------------------------------------------------------------------------------------------

UNIT-IIPART A

1. Define assembler.An assembler is a set of programs that accepts as input an assembly

language program and gives as output its machine equivalent plus other information to the loader.2. Give the assembler directives.

START- Specify name and starting address for the program. END-Indicate the end of the source program BYTE- Generate character or hexadecimal constant, occupying as

many bytes as needed to represent the constant. WORD-Generate one word integer constant. RESB-Reserve the indicated number of bytes for a data area. RESW-Reserve the indicated number of words for a data area.

3. What are the functions required to translate source program to object program?

Converts mnemonic operation codes to their machine language equivalents.

Converts symbolic operands to their equivalent machine addresses.

Builds the machine instructions in the proper format. Converts the data constant specified in the source program into

their internal machine representations. Writes the object program and assembly listing.

4. What are the functions of Pass 1 assembler?a) Assign addresses to all statements in the programb) Save the values assigned to all labels for using pass-2c) Perform some processing of assembler directives

5. What are the functions of Pass 2 assembler?Pass2 (assemble instruction and general object program)

a) Assemble instructions.b) Generate data values defined by BYTE, WORD etc.c) Perform processing of assembler directives not done during Pass1.d) Write the object program and assembling, listing.

Page 17: System Software Question Bank 2012 With Part-B Answers

6. Give the two major internal data structures used in the assembler.SYMTAB is used in pass 1. This includes the name and value for each label in the source program together with the flags to indicate error conditions.SYMTAB & OPTAB are used in pass 2. The information in the opcode tab is predefined. Symtab used is from the output of pass 1.

7. What are fields in symbol table of an assembler?It includes the name and value (address) for each label in the source program, together with flags to indicate error conditions.

8. List the machine dependent assembler features.a) Instruction formats and addressing modes.b) Program relocation

9. Define program relocation.It is a program which can be loaded in any part of the main memory

for execution.10. What are the three different records used in object program?

The header record, text record and the end record are the three different records used in object program.

The header record contains the program name, starting address and length of theprogram.

Text record contains the translated instructions and data of the program.

End record marks the end of the object program and specifies the address in theprogram where execution is to begin.

11. Differentiate absolute expression and relative expression. (May’11)If the result of the expression is an absolute value (constant) then it is

known as absolute expression.Eg : BUFEND – BUFFER

If the result of the expression is relative to the beginning of the program then it is known as relative expression. Label on instructions and data areas and references to the location counter values are relative terms.

Eg: BUFEND + BUFFER12. Explain BASE and NOBASE assembler directives.

BASE – assembler directive used to inform the assembler that the base register contains address for addressing purpose.NOBASE - assembler directive used to inform the assembler that the contents of base register can no longer be relied upon for addressing.

13. Write the format of Text record of object program.Col. 1 TCol. 2~7 Starting address for object code in this record (hex)Col. 8~9 Length of object code in this record in bytes (hex)Col. 10~69 Object code, represented in hex (2 col. per byte)

14. What is meant by literal pool?Literal is a constant operand that is written as part the instruction that

uses it. All of the literal operands used in a program are gathered into one

Page 18: System Software Question Bank 2012 With Part-B Answers

or more literal pools. Normally literals are placed into a pool at the end of the program.

15. List the machine independent assembler features.a) Literals. b) Symbol - defining statements.c) Expressions. d) Program blocks.e) Control sections and program linking.

16. What is meant by literal?Literal is a constant operand that is written as part the instruction that

uses it (ie the value is stated "literally" in the instruction.)All of the literal operands used in a program are gathered into one or more literal pools. Normally literals are placed into a pool at the end of the program.

17. What do you meant by LTORG?LTORG is an assembler directive. When the assembler encounters a

LTORG statement, it creates a literal pool that contains all of the literal operands used since the previous LTORG or the beginning of the program.

18. What is meant by LITTAB?Literal table for each literal the table contains literal name, the operand value and length, the address assigned to the operand.

19. What are the uses of EQU assembler directive?EQU ASSEMBLER DIRECTIVE: enter the symbol name and it’s value into symbol table.

Ex: FIRST EQU 1000 SECOND EQU 2000 In symbol table FIRST 1000 SECOND 2000

20. List the features of MASM Assembler.1. Unlike 1 pass and 2-pass assembler multi pass assembler make

as many passes as are needed to process the definition of symbols.

2. It is not necessary for such an assembler to make more than two passes over the entire program.

3. Instead the portions of the program that involve forward references in the symbol definition are saved during pass 1.

4. Additional passes through these stored definitions are made as assembly progresses.

5. A normal pass 2 follows this process.22. What is a relocatable program? (May’2011)

An object program that has the information necessary to perform the modification is called the relocatable program.

PART- B1. Explain the data structure used in the design of assembler.The simple assembler uses two major internal data structures: the operation Code Table (OPTAB), Symbol Table (SYMTAB) and LOCCTR.

Page 19: System Software Question Bank 2012 With Part-B Answers

OPTAB: It is used to lookup mnemonic operation codes and translates them to their machine language equivalents. In more complex assemblers the table also contains information about instruction format and length. In pass 1 the OPTAB is used to look up and validate the operation code in the source program. In pass 2, it is used to translate the operation codes to machine language. In simple SIC machine this process can be performed in either in pass 1 or in pass 2. But for machine like SIC/XE that has instructions of different lengths, we must search OPTAB in the first pass to find the instruction length for incrementing LOCCTR. In pass 2 we take the information from OPTAB to tell us which instruction format to use in assembling the instruction, and any peculiarities of the object code instruction.

OPTAB is usually organized as a hash table, with mnemonic operation code as the key. The hash table organization is particularly appropriate, since it provides fast retrieval with a minimum of searching. Most of the cases the OPTAB is a static table- that is, entries are not normally added to or deleted from it. In such cases it is possible to design a special hashing function or other data structure to give optimum performance for the particular set of keys being stored.

SYMTAB: This table includes the name and value for each label in the source program, together with flags to indicate the error conditions (e.g., if a symbol is defined in two different places).

During Pass 1: labels are entered into the symbol table along with their assigned address value as they are encountered. All the symbols address value should get resolved at the pass 1.

During Pass 2: Symbols used as operands are looked up the symbol table to obtain the address value to be inserted in the assembled instructions.

SYMTAB is usually organized as a hash table for efficiency of insertion and retrieval. Since entries are rarely deleted, efficiency of deletion is the important criteria for optimization.

Both pass 1 and pass 2 require reading the source program. Apart from this an intermediate file is created by pass 1 that contains each source statement together with its assigned address, error indicators, etc. This file is one of the inputs to the pass 2. A copy of the source program is also an input to the pass 2, which is used to retain the operations that may be performed during pass 1 (such as scanning the operation field for symbols and addressing flags), so that these need not be performed during pass 2. Similarly, pointers into OPTAB and SYMTAB is retained for each operation code and symbol used. This avoids need to repeat many of the table-searching operations.

LOCCTR: Apart from the SYMTAB and OPTAB, this is another important variable which helps in the assignment of the addresses. LOCCTR is

Page 20: System Software Question Bank 2012 With Part-B Answers

initialized to the beginning address mentioned in the START statement of the program. After each statement is processed, the length of the assembled instruction is added to the LOCCTR to make it point to the next instruction. Whenever a label is encountered in an instruction the LOCCTR value gives the address to be associated with that label.---------------------------------------------------------------------------------------------------------------------2. Explain the algorithm for pass 1& pass 2 of an assembler.

Algorithm for Pass 1:Begin read first input line if OPCODE = ‘START’ then begin save #[Operand] as starting addr initialize LOCCTR to starting address write line to intermediate file read next line end( if START) else initialize LOCCTR to 0While OPCODE != ‘END’ do begin if this is not a comment line then begin if there is a symbol in the LABEL field then begin search SYMTAB for LABEL if found then set error flag (duplicate symbol) else (if symbol) search OPTAB for OPCODE if found then add 3 (instr length) to LOCCTR else if OPCODE = ‘WORD’ then add 3 to LOCCTRelse if OPCODE = ‘RESW’ then add 3 * #[OPERAND] to LOCCTR else if OPCODE = ‘RESB’ then add #[OPERAND] to LOCCTR else if OPCODE = ‘BYTE’ then begin find length of constant in bytes add length to LOCCTR end else set error flag (invalid operation code) end (if not a comment) write line to intermediate file

Page 21: System Software Question Bank 2012 With Part-B Answers

read next input line end { while not END} write last line to intermediate file Save (LOCCTR – starting address) as program lengthEnd {pass 1}

The algorithm scans the first statement START and saves the operand field (the address) as the starting address of the program. Initializes the LOCCTR value to this address. This line is written to the intermediate line. If no operand is mentioned the LOCCTR is initialized to zero. If a label is encountered, the symbol has to be entered in the symbol table along with its associated address value. If the symbol already exists that indicates an entry of the same symbol already exists. So an error flag is set indicating a duplication of the symbol. It next checks for the mnemonic code, it searches for this code in the OPTAB. If found then the length of the instruction is added to the LOCCTR to make it point to the next instruction. If the opcode is the directive WORD it adds a value 3 to the LOCCTR. If it is RESW, it needs to add the number of data word to the LOCCTR. If it is BYTE it adds a value one to the LOCCTR, if RESB it adds number of bytes. If it is END directive then it is the end of the program it finds the length of the program by evaluating current LOCCTR – the starting address mentioned in the operand field of the END directive. Each processed line is written to the intermediate file.

Algorithm for Pass 2: Begin read 1st input line if OPCODE = ‘START’ then begin write listing line read next input line end write Header record to object program initialize 1st Text recordwhile OPCODE != ‘END’ do begin if this is not comment line then begin search OPTAB for OPCODE if found then begin if there is a symbol in OPERAND field then begin search SYMTAB for OPERAND field then if found then

begin store symbol value as operand address else begin

Page 22: System Software Question Bank 2012 With Part-B Answers

store 0 as operand address set error flag (undefined symbol) end end (if symbol) else store 0 as operand address assemble the object code instruction else if OPCODE = ‘BYTE’ or ‘WORD” then convert constant to object code if object code doesn’t fit into current Text record then begin Write text record to object code initialize new Text record end add object code to Text record end {if not comment} write listing line read next input line end write listing line read next input line write last listing lineEnd {Pass 2}

Here the first input line is read from the intermediate file. If the opcode is START, then this line is directly written to the list file. A header record is written in the object program which gives the starting address and the length of the program (which is calculated during pass 1). Then the first text record is initialized. Comment lines are ignored. In the instruction, for the opcode the OPTAB is searched to find the object code. If a symbol is there in the operand field, the symbol table is searched to get the address value for this which gets added to the object code of the opcode. If the address not found then zero value is stored as operands address. An error flag is set indicating it as undefined. If symbol itself is not found then store 0 as operand address and the object code instruction is assembled.

If the opcode is BYTE or WORD, then the constant value is converted to its equivalent object code( for example, for character EOF, its equivalent hexadecimal value ‘454f46’ is stored). If the object code cannot fit into the current text record, a new text record is created and the rest of the instructions object code is listed. The text records are written to the object program. Once the whole program is assemble and when the END directive is encountered, the End record is written.--------------------------------------------------------------------------------------------------------------------3. Explain the algorithm for pass 2 of the assembler. (May’11)

Refer Algorithm for pass -2 from previous question---------------------------------------------------------------------------------------------------------------

Page 23: System Software Question Bank 2012 With Part-B Answers

4. Discuss about the machine- independent features of an assembler. (May’11)These are the features which do not depend on the architecture of the

machine. These are: Literals Symbol Defining statements – EQU and ORG Expressions Program blocks Control sections

1) Literals:A literal is defined with a prefix = followed by a specification of the

literal value.Example:45 001A ENDFIL LDA =C’EOF’ 032010--93 LTORG

002D * =C’EOF’ 454F46The example above shows a 3-byte operand whose value is a

character string EOF. The object code for the instruction is also mentioned. It shows the relative displacement value of the location where this value is stored. In the example the value is at location (002D) and hence the displacement value is (010). As another example the given statement below shows a 1-byte literal with the hexadecimal value ‘05’.

215 1062 WLOOP TD =X’05’ E32011

It is important to understand the difference between a constant defined as a literal and a constant defined as an immediate operand. In case of literals the assembler generates the specified value as a constant at some other memory location In immediate mode the operand value is assembled as part of the instruction itself. Example

55 0020 LDA #03 010003

All the literal operands used in a program are gathered together into one or more literal pools. This is usually placed at the end of the program. The assembly listing of a program containing literals usually includes a listing of this literal pool, which shows the assigned addresses and the generated data values. In some cases it is placed at some other location in the object program. An assembler directive LTORG is used. Whenever the LTORG is encountered, it creates a literal pool that contains all the literal operands used since the beginning of the program. The literal pool definition is done after LTORG is encountered. It is better to place the literals close to the instructions.

A literal table is created for the literals which are used in the program. The literal table contains the literal name, operand value and length. The literal table is usually created as a hash table on the literal name.

Page 24: System Software Question Bank 2012 With Part-B Answers

Implementation of Literals:During Pass-1:

The literal encountered is searched in the literal table. If the literal already exists, no action is taken; if it is not present, the literal is added to the LITTAB and for the address value it waits till it encounters LTORG for literal definition. When Pass 1 encounters a LTORG statement or the end of the program, the assembler makes a scan of the literal table. At this time each literal currently in the table is assigned an address. As addresses are assigned, the location counter is updated to reflect the number of bytes occupied by each literal.

During Pass-2:The assembler searches the LITTAB for each literal encountered in

the instruction and replaces it with its equivalent value as if these values are generated by BYTE or WORD. If a literal represents an address in the program, the assembler must generate a modification relocation for, if it all it gets affected due to relocation. The following figure shows the difference between the SYMTAB and LITTAB

2) Symbol-Defining Statements:EQU Statement:

Most assemblers provide an assembler directive that allows the programmer to define symbols and specify their values. The directive used for this EQU (Equate). The general form of the statement is

Symbol EQU value

This statement defines the given symbol (i.e., entering in the SYMTAB) and assigning to it the value specified. The value can be a constant or an expression involving constants and any other symbol which is already defined. One common usage is to define symbolic names that can be used to improve readability in place of numeric values. For example

+LDT #4096

This loads the register T with immediate value 4096, this does not clearly what exactly this value indicates. If a statement is included as:

Page 25: System Software Question Bank 2012 With Part-B Answers

MAXLEN EQU 4096 and then+LDT #MAXLEN

Then it clearly indicates that the value of MAXLEN is some maximum length value. When the assembler encounters EQU statement, it enters the symbol MAXLEN along with its value in the symbol table. During LDT the assembler searches the SYMTAB for its entry and its equivalent value as the operand in the instruction. The object code generated is the same for both the options discussed, but is easier to understand. If the maximum length is changed from 4096 to 1024, it is difficult to change if it is mentioned as an immediate value wherever required in the instructions. We have to scan the whole program and make changes wherever 4096 is used. If we mention this value in the instruction through the symbol defined by EQU, we may not have to search the whole program but change only the value of MAXLENGTH in the EQU statement (only once).

Another common usage of EQU statement is for defining values for the general-purpose registers. The assembler can use the mnemonics for register usage like a-register A , X – index register and so on. But there are some instructions which requires numbers in place of names in the instructions. For example in the instruction RMO 0,1 instead of RMO A,X. The programmer can assign the numerical values to these registers using EQU directive.

A EQU 0X EQU 1 and so on

These statements will cause the symbols A, X, L… to be entered into the symbol table with their respective values. An instruction RMO A, X would then be allowed. As another usage if in a machine that has many general purpose registers named as R1, R2,…, some may be used as base register, some may be used as accumulator. Their usage may change from one program to another. In this case we can define these requirement using EQU statements.

BASE EQU R1INDEX EQU R2COUNT EQU R3

One restriction with the usage of EQU is whatever symbol occurs in the right hand side of the EQU should be predefined. For example, the following statement is not valid:

BETA EQU ALPHAALPHA RESW 1

As the symbol ALPHA is assigned to BETA before it is defined. The value of ALPHA is not known.

Page 26: System Software Question Bank 2012 With Part-B Answers

ORG Statement:

This directive can be used to indirectly assign values to the symbols. The directive is usually called ORG (for origin). Its general format is:

ORG valueWhere value is a constant or an expression involving constants and previously defined symbols. When this statement is encountered during assembly of a program, the assembler resets its location counter (LOCCTR) to the specified value. Since the values of symbols used as labels are taken from LOCCTR, the ORG statement will affect the values of all labels defined until the next ORG is encountered. ORG is used to control assignment storage in the object program. Sometimes altering the values may result in incorrect assembly.

ORG can be useful in label definition. Suppose we need to define a symbol table with the following structure:SYMBOL 6 BytesVALUE 3 BytesFLAG 2 BytesThe table looks like the one given below.

The symbol field contains a 6-byte user-defined symbol; VALUE is a one-word representation of the value assigned to the symbol; FLAG is a 2-byte field specifies symbol type and other information. The space for the ttable can be reserved by the statement:

STAB RESB 1100

If we want to refer to the entries of the table using indexed addressing, place the offset value of the desired entry from the beginning of the table in the index register. To refer to the fields SYMBOL, VALUE, and FLAGS individually, we need to assign the values first as shown below:

SYMBOL EQU STABVALUE EQU STAB+6FLAGS EQU STAB+9

Page 27: System Software Question Bank 2012 With Part-B Answers

To retrieve the VALUE field from the table indicated by register X, we can write a statement:

LDA VALUE, XThe same thing can also be done using ORG statement in the following way:

STAB RESB 1100ORG STAB

SYMBOL RESB 6VALUE RESW 1FLAG RESB 2

ORG STAB+1100The first statement allocates 1100 bytes of memory assigned to label

STAB. In the second statement the ORG statement initializes the location counter to the value of STAB. Now the LOCCTR points to STAB. The next three lines assign appropriate memory storage to each of SYMBOL, VALUE and FLAG symbols. The last ORG statement reinitializes the LOCCTR to a new value after skipping the required number of memory for the table STAB (i.e., STAB+1100).

While using ORG, the symbol occurring in the statement should be predefined as is required in EQU statement. For example for the sequence of statements below:

ORG ALPHABYTE1 RESB 1BYTE2 RESB 1BYTE3 RESB 1

ORGALPHA RESB 1

The sequence could not be processed as the symbol used to assign the new location counter value is not defined. In first pass, as the assembler would not know what value to assign to ALPHA, the other symbol in the next lines also could not be defined in the symbol table. This is a kind of problem of the forward reference.

Expressions:Assemblers also allow use of expressions in place of operands in the

instruction. Each such expression must be evaluated to generate a single operand value or address. Assemblers generally arithmetic expressions formed according to the normal rules using arithmetic operators +, - *, /. Division is usually defined to produce an integer result. Individual terms may be constants, user-defined symbols, or special terms. The only special term used is * ( the current value of location counter) which indicates the value of the next unassigned memory location. Thus the statement

BUFFEND EQU *

Page 28: System Software Question Bank 2012 With Part-B Answers

Assigns a value to BUFFEND, which is the address of the next byte following the buffer area. Some values in the object program are relative to the beginning of the program and some are absolute (independent of the program location, like constants). Hence, expressions are classified as either absolute expression or relative expressions depending on the type of value they produce.

Absolute Expressions: The expression that uses only absolute terms is absolute expression. Absolute expression may contain relative term provided the relative terms occur in pairs with opposite signs for each pair. Example:

MAXLEN EQU BUFEND-BUFFERIn the above instruction the difference in the expression gives a value that does not depend on the location of the program and hence gives an absolute immaterial o the relocation of the program. The expression can have only absolute terms. Example:

MAXLEN EQU 1000

Relative Expressions: All the relative terms except one can be paired as described in “absolute”. The remaining unpaired relative term must have a positive sign. Example:

STAB EQU OPTAB + (BUFEND – BUFFER)

Handling the type of expressions: to find the type of expression, we must keep track the type of symbols used. This can be achieved by defining the type in the symbol table against each of the symbol as shown in the table below:

---------------------------------------------------------------------------------------------------------------------

5. Explain the machine dependent features of an assembler.Machine-Dependent Features:

Instruction formats and addressing modes Program

relocation

I. Instruction formats and Addressing ModesThe instruction formats depend on the memory organization and the size

of the memory. In SIC machine the memory is byte addressable. Word size

Page 29: System Software Question Bank 2012 With Part-B Answers

is 3 bytes. So the size of the memory is 212 bytes. Accordingly it supports only one instruction format. It has only two registers: register A and Index register. Therefore the addressing modes supported by this architecture are direct, indirect, and indexed. Whereas the memory of a SIC/XE machine is 220 bytes (1 MB). This supports four different types of instruction types, they are:

1 byte instruction 2 byte instruction 3 byte instruction 4 byte instruction

• Instructions can be:– Instructions involving register to register– Instructions with one operand in memory, the other in

Accumulator (Single operand instruction)– Extended instruction format

• Addressing Modes are:– Index Addressing(SIC): Opcode m, x– Indirect Addressing: Opcode @m– PC-relative: Opcode m– Base relative: Opcode m– Immediate addressing: Opcode #c

1. Translations for the Instruction involving Register-Register addressing mode:

During pass 1 the registers can be entered as part of the symbol table itself. The value for these registers is their equivalent numeric codes. During pass 2, these values are assembled along with the mnemonics object code. If required a separate table can be created with the register names and their equivalent numeric values.

2. Translation involving Register-Memory instructions:

In SIC/XE machine there are four instruction formats and five addressing modes.

Among the instruction formats, format -3 and format-4 instructions are Register-Memory type of instruction. One of the operand is always in a register and the other operand is in the memory. The addressing mode tells us the way in which the operand from the memory is to be fetched.

There are two ways: Program-counter relative and Base-relative. This addressing mode can be represented by either using format-3 type or format-4 type of instruction format. In format-3, the instruction has the opcode followed by a 12-bit displacement value in the address field. Where as in format-4 the instruction contains the mnemonic code followed by a 20-bit displacement value in the address field.

Page 30: System Software Question Bank 2012 With Part-B Answers

Program-Counter Relative: In this usually format-3 instruction format is used. The instruction contains the opcode followed by a 12-bit displacement value. The range of displacement values are from 0 -2048. This displacement (should be small enough to fit in a 12-bit field) value is added to the current contents of the program counter to get the target address of the operand required by the instruction. This is relative way of calculating the address of the operand relative to the program counter. Hence the displacement of the operand is relative to the current program counter value. The following example shows how the address is calculated:

Base-Relative Addressing Mode: in this mode the base register is used to mention the displacement value. Therefore the target address is

TA = (base) + displacement value

This addressing mode is used when the range of displacement value is not sufficient. Hence the operand is not relative to the instruction as in PC-relative addressing mode. Whenever this mode is used it is indicated by using a directive BASE. The moment the assembler encounters this directive the next instruction uses base-relative addressing mode to calculate the target address of the operand.

When NOBASE directive is used then it indicates the base register is no more used to calculate the target address of the operand. Assembler first chooses PC-relative, when the displacement field is not enough it uses Base-relative.

LDB #LENGTH (instruction)BASE LENGTH (directive)

Page 31: System Software Question Bank 2012 With Part-B Answers

:NOBASE

For example:

12 0003 LDB #LENGTH 69202D13 BASE LENGTH: :100 0033 LENGTH RESW 1105 0036 BUFFER RESB 4096: :160 104E STCH BUFFER, X 57C003165 1051 TIXR T B850

In the above example the use of directive BASE indicates that Base-relative addressing mode is to be used to calculate the target address. PC-relative is no longer used. The value of the LENGTH is stored in the base register. If PC-relative is used then the target address calculated is:

The LDB instruction loads the value of length in the base register which 0033. BASE directive explicitly tells the assembler that it has the value of LENGTH.

BUFFER is at location (0036)16

(B) = (0033)16

disp = 0036 – 0033 = (0003)16

20 000A LDA LENGTH 032026: :175 1056 EXIT STX LENGTH 134000

Consider Line 175. If we use PC-relative

Disp = TA – (PC) = 0033 –1059 = EFDA

PC relative is no longer applicable, so we try to use BASE relative addressing mode.

Immediate Addressing Mode

In this mode no memory reference is involved. If immediate mode is used the target address is the operand itself.

Page 32: System Software Question Bank 2012 With Part-B Answers

If the symbol is referred in the instruction as the immediate operand then it is immediate with PC-relative mode as shown in the example below:

Indirect and PC-relative mode:

In this type of instruction the symbol used in the instruction is the address of the location which contains the address of the operand. The address of this is found using PC-relative addressing mode. For example:

The instruction jumps the control to the address location RETADR which in turn has the address of the operand. If address of RETADR is 0030, the target address is then 0003 as calculated above.

II. Program Relocation

Sometimes it is required to load and run several programs at the same time. The system must be able to load these programs wherever there is place in the memory. Therefore the exact starting is not known until the load time. Absolute ProgramIn this the address is mentioned during assembling itself. This is called Absolute Assembly. Consider the instruction:

Page 33: System Software Question Bank 2012 With Part-B Answers

55 101B LDA THREE 00102D

This statement says that the register A is loaded with the value stored at location 102D. Suppose it is decided to load and execute the program at location 2000 instead of location 1000. Then at address 102D the required value which needs to be loaded in the register A is no more available. The address also gets changed relative to the displacement of the program. Hence we need to make some changes in the address portion of the instruction so that we can load and execute the program at location 2000. Apart from the instruction which will undergo a change in their operand address value as the program load address changes. There exist some parts in the program which will remain same regardless of where the program is being loaded.

Since assembler will not know actual location where the program will get loaded, it cannot make the necessary changes in the addresses used in the program. However, the assembler identifies for the loader those parts of the program which need modification. An object program that has the information necessary to perform this kind of modification is called the relocatable program.

The above diagram shows the concept of relocation. Initially the program is loaded at location 0000. The instruction JSUB is loaded at location 0006. The address field of this instruction contains 01036, which is the address of the instruction labeled RDREC. The second figure shows that if the program is to be loaded at new location 5000. The address of the instruction JSUB gets modified to new location 6036. Likewise the third figure shows that if the program is relocated at location 7420, the JSUB instruction would need to be changed to 4B108456 that correspond to the new address of RDREC.

The only part of the program that require modification at load time are those that specify direct addresses. The rest of the instructions need not be modified. The instructions which doesn’t require modification are the

Page 34: System Software Question Bank 2012 With Part-B Answers

ones that is not a memory address (immediate addressing) and PC-relative, Base-relative instructions. From the object program, it is not possible to distinguish the address and constant The assembler must keep some information to tell the loader. The object program that contains the modification record is called a relocatable program.

For an address label, its address is assigned relative to the start of the program (START 0). The assembler produces a Modification record to store the starting location and the length of the address field to be modified. The command for the loader must also be a part of the object program. The Modification has the following format:

Modification recordCol. 1 MCol. 2-7 Starting location of the address field to be modified, relative to the beginning of the program (Hex)Col. 8-9 Length of the address field to be modified, in half-bytes (Hex)

One modification record is created for each address to be modified The length is stored in half-bytes (4 bits) The starting location is the location of the byte containing the leftmost bits of the address field to be modified. If the field contains an odd number of half-bytes, the starting location begins in the middle of the first byte.

In the above object code the red boxes indicate the addresses that need modifications. The object code lines at the end are the descriptions of the modification records for those instructions which need change if relocation occurs. M00000705 is the modification suggested for the statement at location 0007 and requires modification 5-half bytes. Similarly the remaining instructions indicate.

---------------------------------------------------------------------------------------------------------------------

Page 35: System Software Question Bank 2012 With Part-B Answers

6. Explain the different instruction formats & sets & addressing modes used in the assembler.

Addressing modes:----------------------------------------------------------------------------------------------------------------7. Explain the design of one pass assembler.

One-Pass AssemblerThe main problem in designing the assembler using single pass was to resolve forward references. We can avoid to some extent the forward references by:

Eliminating forward reference to data items, by defining all the storage reservation statements at the beginning of the program rather at the end.

Unfortunately, forward reference to labels on the instructions cannot be avoided. (forward jumping)

To provide some provision for handling forward references by prohibiting forward references to data items.

There are two types of one-pass assemblers: One that produces object code directly in memory for immediate

execution (Load-and-go assemblers). The other type produces the usual kind of object code for later

execution.

Load-and-Go Assembler Load-and-go assembler generates their object code in memory for

immediate execution. No object program is written out, no loader is needed. It is useful in a system with frequent program development and

testingo The efficiency of the assembly process is an important

consideration. Programs are re-assembled nearly every time they are run; efficiency

of the assembly process is an important consideration.

Page 36: System Software Question Bank 2012 With Part-B Answers

Forward Reference in One-Pass Assemblers: In load-and-Go assemblers when a forward reference is encountered :

Omits the operand address if the symbol has not yet been defined Enters this undefined symbol into SYMTAB and indicates that it is

undefined Adds the address of this operand address to a list of forward

references associated with the SYMTAB entry When the definition for the symbol is encountered, scans the

reference list and inserts the address. At the end of the program, reports the error if there are still

SYMTAB entries indicated undefined symbols. For Load-and-Go assembler

o Search SYMTAB for the symbol named in the END statement and jumps to this location to begin execution if

there is no error After Scanning line 40 of the program:40 2021 J` CLOOP 302012The status is that upto this point the symbol RREC is referred once at location 2013, ENDFIL at 201F and WRREC at location 201C. None of these symbols are defined. The figure shows that how the pending definitions along with their addresses are included in the symbol table.

Page 37: System Software Question Bank 2012 With Part-B Answers

The status after scanning line 160, which has encountered the definition of RDREC and ENDFIL is as given below:

If One-Pass needs to generate object code:

If the operand contains an undefined symbol, use 0 as the address and write the Text record to the object program.

Forward references are entered into lists as in the load-and-go assembler.

Page 38: System Software Question Bank 2012 With Part-B Answers

When the definition of a symbol is encountered, the assembler generates another Text record with the correct operand address of each entry in the reference list.

When loaded, the incorrect address 0 will be updated by the latter Text record containing the symbol definition.

Algorithm for One pass AssemblerBegin read first input line if OPCODE = ‘START’ then begin save #[Operand] as starting addr initialize LOCCTR to starting address write line to intermediate file read next input line end( if START) else initialize LOCCTR to 0While OPCODE != ‘END’ do begin if this is not a comment line then begin if there is a symbol in the LABEL field then begin search SYMTAB for LABEL if found then begin if symbol value as null

set symbol value as LOCCTR and search the linked list with the corresponding operand

PTR addresses and generates operand addresses as corresponding symbol values

set symbol value as LOCCTR in symbol table and delete the linked list end

else insert (LABEL, LOCCTR) into STMTABendsearch OPTAB for OPCODE if found then begin search SYMTAB for OPERND address if found then if symbol value not equal to null then store symbol value as operand address else insert at the end of the linked list with a node with

address as LOCCTR else

Page 39: System Software Question Bank 2012 With Part-B Answers

insert ( symbol name, null) add 3 (instr length) to LOCCTR

end else if OPCODE = ‘WORD’ then add 3 to LOCCTRelse if OPCODE = ‘RESW’ then add 3 * #[OPERAND] to LOCCTR else if OPCODE = ‘RESB’ then add #[OPERAND] to LOCCTR else if OPCODE = ‘BYTE’ then begin find length of constant in bytes add length to LOCCTR covert constant to object code endif object code doesn’t fit into current Text record then begin Write text record to object program initialize new Text record end add object code to Text record end {if not comment} write listing line read next input line end write last text record to object pgm write end record to object pgm Write last listing lineEnd

Object Code Generated by One-Pass Assembler:

---------------------------------------------------------------------------------------------------------------------8. Explain the design of multi pass assembler.Multi_Pass Assembler:

Page 40: System Software Question Bank 2012 With Part-B Answers

For a two pass assembler, forward references in symbol definition are not allowed:

ALPHA EQU BETABETA EQU DELTADELTA RESW 1

o Symbol definition must be completed in pass 1. Prohibiting forward references in symbol definition is not a

serious inconvenience.o Forward references tend to create difficulty for a person

reading the program.

Implementation Issues for Modified Two-Pass Assembler:Implementation Issues when forward referencing is encountered in Symbol Defining statements : For a forward reference in symbol definition, we store in the SYMTAB:

o The symbol nameo The defining expressiono The number of undefined symbols in the defining expression

The undefined symbol (marked with a flag *) associated with a list of symbols depend on this undefined symbol.

When a symbol is defined, we can recursively evaluate the symbol expressions depending on the newly defined symbol.

Multi-Pass Assembler Example Program

Multi-Pass Assembler (Figure 2.21 of Beck): Example for forward reference in Symbol Defining Statements:

Page 41: System Software Question Bank 2012 With Part-B Answers

9. Discuss about MASM assembler.

UNIT-IIIPART A

1. Define loader.Loading brings the object program into memory for execution. A loader

is a system program that performs the loading function. Many loaders also support relocation and linking.2. What is the use of loader?

Bringing an object program into memory and starting its execution.3. Define bootstrap loader.

When a computer is first turned on or restarted, a special type of absolute loader, called a bootstrap loader, is executed. This bootstrap loader loads the first program to be run by the computer-usually an operating system.

4. Define relocating loaders.

Page 42: System Software Question Bank 2012 With Part-B Answers

Loaders that allow for program relocation are called relocating loaders or relative loaders. A Modification record is used to describe each part of the object code that must be changed when the program is relocated.

5. What is a linking loader?A linking loader performs all linking and relocation operations,

including automatic library search if specified, and loads the linked program directly into memory for execution.

6. Give the main internal data structures used in the linking loader.External Symbol Table ESTAB analogous to symbol table to store the name and address of each external symbol in the set of control sections being loaded.

7. List the disadvantages of absolute loader:For an absolute loader, the address at which the program is to be

loaded must be specified beforehand. Also, it is not possible to load just the required subroutines alone. Thus it is disadvantageous as it is inefficient in terms of both space and execution time.

8. What are the different ways in which relocation is implemented by a relocation loader in SIC & SIC/XE architecture?

In SIC architecture, since most of the instructions use direct addresses and need modification during program relocation, relocation bits are used by the relocation loader. Whereas, in SIC/XE architecture, since only a few instructions require modification as the others use relative addresses modification records are used by the relocation loader.

9. What is the advantage of reference-number mechanism in the refer and modification records?

The reference-number mechanism assigns a reference number to each external symbol referred to in a control section. This reference number is used in modification records. The advantage of this mechanism is that it avoids multiple searches of ESTAB for the same symbol during the loading of a control section. An external reference symbol can be looked up in ESTAB once for each control section that uses it. The values for code modification can be obtained by simply indexing into an array of these values.

10. What is the purpose of relocation bits in object programs for relocatable loader?

On a machine like SIC that primarily uses direct addressing, most of the instructions have to be modified during program relocation. Thus it is not possible to write modification record for each instruction. Therefore we use the relocation bits in the text record which help to identify the instructions that require modification.

11. Define PROGADDR and CSADDR.PROGADDR and CSADDR are the important variables of linking

loader. PROGADDR is the beginning address in memory where the linked program is to be loaded. Its value is supplied to the loader by the operating system.

12. Define DEFINE record and REFER record :

Page 43: System Software Question Bank 2012 With Part-B Answers

DEFINE record is a record that gives information about the external symbols defined in the current control section, i.e., the symbols named by EXTDEF.

13. What are the differences between linking loader and linkage editor? (May ’11)

A linking loader performs all linking and relocation operations including automatic library search and loads the linked program directly into memory for immediate execution. Linking loader can be preferred when a program is to be executed several times with each time reassembled.

A linkage editor stores the linked version of the program in a file or library for later execution. At the time of execution, a relocatable loader is used to load the linked program into memory. Linkage editor can be preferred when a program is to be executed several times without being reassembled.

14. What do you meant by automatic library search?The linking loaders automatically incorporate routines from a

subprogram library into the program being loaded. These subroutines are automatically fetched from the library, linked with the main program and loaded. This is called automatic library search.

15. What is load map table?Load map table contains the external symbols defined in the set of

control sections together with the address assigned to each. Loaders include as an option and the ability to print the load map that includes these symbols and their addresses.

16. Write the use of ESTAB.ESTAB is used to store the name and address of each external

symbol in the set of control section being loaded.17. List the Machine-independent loader features.

i) Automatic library searchii) Loader options

18. Define Linkage loader.A linkage editor, on the other hand, produces a linked version of the

program (often called a load module or an executable image), which is written to a file or library for later execution.

19. Define dynamic linking.A scheme that postpones the linking until execution time; a

subroutine is loaded and linked to the rest of the program when it is first called. This type of function is usually called dynamic linking, dynamic loading, or load on call.

20. Define MS-DOS Linker.MS-DOS Linker is a linkage editor that combines one or more object

modules to produce a complete executable program.21. What is meant by dynamic loading? (May’11)

A subroutine is loaded into main memory when it is first called. This type of function is usually called dynamic loading or load on call.

Page 44: System Software Question Bank 2012 With Part-B Answers

PART-B1. Discuss briefly about absolute loader.

2. Discuss about Bootstrap Loader.3. Explain Automatic Library Search.4. Discuss about Linkage editor.5. Discuss about Dynamic Linking.6. Write down and explain the algorithms for pass 1 and pass 2 of loaders.

(May’11)7. Discuss about the loader design options. (May’11)8. Discuss machine independent loader features.9. Discuss machine dependent loader features.10. Explain about MS-DOS Linker.

UNIT-IVPART-A

1. Define macro definition and macro expansion.A macro definition is enclosed between a macro header (MACRO)

and a macro end (MEND) statements. Macro definition is typically located at the start of the program.

The macro processor replaces each macroinstruction with corresponding group of source language statements. This is called expanding the macros.

2. What are the functions of a macro processor?The functions of a macro processor involve the substitution of one group of characters or lines for another.

3. What is the new assembler directives used in macro definition.MACRO---identifies the beginning of a macro definition.MEND --- identifies the end of a macro definition.

4. Give the macroinstructions used by a SIC/XE program.RDBUFF---To read record into buffer.WRBUFF--- To write record into buffer.

5. What is conditional macro expansion?Most macro processors can also modify the sequence of statements

generated for a macro expansion depending on the arguments supplied in the macro invocation.

The use of IF-ELSE-ENDIF structure provides a mechanism for either generating (once) or skipping selected statements in the macro body.

The use of WHILE-ENDW structure provides a mechanism for generating the set of statements enclosed within loop repeatedly as long as a particular condition is true.

6. What is macro time variable? (May’11)Macro time variable that stores the working values during the macro

expansion. Any symbol that begins with the character & and then is not a macro instruction parameter is assumed to be a macro time variable.

7. What is meant by positional parameters?

Page 45: System Software Question Bank 2012 With Part-B Answers

If the parameters and arguments were associated with each other according to their positions in the macro prototype and the macro invocation statement, then these parameters in macro definitions are called as positional parameters.

8. Consider the macro definition#Define DISPLAY(EXPR) Printf(“EXPR = %d\\n”,EXPR)Expand the macro instruction DISPLAY (ANS)Ans.: Printf (“EXPR = %d\\n”, ANS)

9. What are known as nested macro call?The statement, in which a macro calls on another macro, is called

nested macro call. In the nested macro call, the call is done by outer macro and the macro called is the inner macro.

10. Give the advantage of line-by-line processors.*It avoids the extra pass over the source program during assembling*It may use some of the utility that can be used by language

translators so that can be loaded once.

11. What is meant by line-by-line processor?This macro processor reads the source program statements, process

the statements and then the output lines are passed to the language translators as they are generated, instead of being written in an expanded file.

12. Give the advantages of general-purpose macro processors.*The programmer does not need to learn about a macro facility for each compiler.*Overall saving in software development cost and a maintenance cost

13. What are the important factors considered while designing general purpose macro processors?

Comments Grouping of statements Tokens Syntax used for macro definitions

14. What is the difference between MASM macro processor and the one for SIC?

MASM PROCESSOR SIC The labels are unique names ??0000(??0001 to ??ffff) .ERR signals the MASM that an error has been detected ;; denotes the macro comment which is skipped during

expansion and used for readability Macro parameter need not begin with & or any other

special character The labels are given as ?AA to ?ZZ15. What is meant by concatenation of macro parameter?

Most macro processors allow parameters to be concatenated with other character string. Suppose that the parameter to such a macroinstruction is named &ID. The body of the macro definition might contain a statement like: LDA X&ID in which the parameter &ID is concatenated after the character string X.

16. List down the data structures used by macro processor. (May’11)

Page 46: System Software Question Bank 2012 With Part-B Answers

a) DEFTAB -Macro definition is stored in this tableb) NAMTAB -The macro names are entered herec) ARGTAB -It refers an argument table.

17. List the Machine-independent macro processor.i) Concatenation of macro parametersii) Generation of unique leveliii) Conditional Macro Expansioniv) Keyword macro parameters.

18. What is the difference between macro invocation and subroutine call?

The most significant difference between macro invocation and subroutine call is the statements that form the expansion of a macro are generated each time, when the macro is invoked but the statements in a subroutine appear only once regardless of how many times the subroutine is called.

19. List the features of MASM macro processor. The macro processor of MASM is integrated with Pass 1 of the

assembler. Macros may be redefined within the program without causing an

error. The main difference between MASM macro processor and that of

SIC lies in the nature of the conditional macro expansion statements. MASM calls these CONDITIONAL ASSEMBLY statements.

The macro parameters in MASM need not begin with & or any other special character.

The end of the macro is marked by ENDM.20. Define a macro in C Language.

#define MAX(A,B) ( A > B ) ? ( A) : ( B ) main(){

int j,k;j = 10;k = 500;printf(“ This programs finds the max of two

values \n”);printf(“ The Maximum of (10,500) is = %d”,

MAX( j,k ) ) ;}

PART-B1. Write the algorithm for Macro processor.2. Write the machine independent features macro processor.3. i) Explain recursive macro expansion with an example (May’11)

ii) Explain keyword macro parameters with suitable example. (May’11)4. Discuss about MASM macro processor.5. Discuss about ANSI C Language.

Page 47: System Software Question Bank 2012 With Part-B Answers

6. Write notes on i) conditional Macro ii) Generation of unique labels. (May’11)

UNIT-VPART-A

1. Define interactive editor.Interactive Editor is a computer program that allows a user to create

and revise a target document. 2. Give the tasks of document-editing process.

1. Select the part of the target document to viewed and manipulated.

2. Determine how to format this view online & how to display it.3. Specify and Execute operations that modify the target

document.4. Update the view appropriately.

3. Mention some of the user interface and its uses.Keyboard, Mouse, Light Pen, Digitizer and Joy Stick.

4. What are the three categories of editor’s devices? Text device/ String devices Button device/Choice devices Locator device

5. What is the function performed in editing phase?In the actual editing phase, the target document is created or altered

with a set of operations such as insert, delete, replace, move and copy.6. What is the function performed in voice input device?

Voice-input devices, which translate spoken words to their textual equivalents, may prove to be the text input devices of the future. Voice recognizers are currently available for command input on some systems.

7. What are called tokens?The lexical analyzer tracks the source program one character at a

time by making the source program into sequence of atomic units is called tokens.

8. Name some of typical tokens.Identifiers, keywords, constants, operators and punctuation symbols such as commas and parentheses are typical tokens.

9. Name some of text editors.• Line editors• Stream editors• Screen editors• Word processors• Structure editors

10. Give the components of editor. Command Language Processor Editing Component & Display Component Travelling Component & Viewing Component Editing Filter and Viewing Filter.

11. What is the function of Interactive debugging systems?

Page 48: System Software Question Bank 2012 With Part-B Answers

It provides the programmer with facilities that aid in testing and debugging of programs. They allow you to see what is going on ``inside'' another program while it executes--or what another program was doing at the moment it crashed.

gdb interactive debugger available in Linux environment.GDB to debug programs written in C, C++, and Modula-2. GDB is

invoked with the shell command gdb. 12. Define debugging.

Debugging is the process of removing an error in the program during Compilation.13. Mention the Debugging functions and its uses.

Tracing-- It is used to track the flow of execution logic and data modifications.

Traceback—Show the path by which the current statement was reached.

14. Define Line Editor:They allowed editing operations within a single line or integral number of lines.

15. What is the function of command language processor? (May’11)It accepts inputs from the users and analyses tokens and syntactic

structure of commands. 16. Write about viewing component of the editor.

In viewing a document, the start area to be viewed is determined by the current viewing pointer. This pointer is maintained by viewing component of the editor.

Viewing component is a collection of modules responsible for detemaining the next view.

17. Define user interface?User interface is one, which allows the user to communicate with the

system in order to perform certain tasks. User interface is generally designed in a computer to make it easier to use.

18. What are the basic types of computing environments used in editors functions?

Editor’s function in three basic types of computing environmentsi.Time sharingii.Stand-aloneiii.Distributed

19. What are the methods in Interaction language of a text editor?a. Typing –oriented or text command oriented methodb. Function key interfacesc. Menu oriented method

20. Define Locator device?Locator devices are two-dimensional analog-to-digital

converters that position a cursor symbol on the screen by observing the user’s movement of the device. The most common such devices for editing applications are the mouse and the data tablet.

21. Define tracing. (May’11)

Page 49: System Software Question Bank 2012 With Part-B Answers

Tracing is used to track the flow of execution logic and data modifications.

PART-B

1. Explain the text editor in detail / write notes on editor structure (May’11)2. Explain the overview of editing process.3. Discuss about functions of Interactive Debugging system. (May’11)4. Draw the neat sketch and explain Editor Structure.5. Write short notes on

a. User interface (May’11)b. Debugging functions and capabilities.

@@@@@@@@@@@